1. Programming language built into user programs such as Word and Excel are known as ________

A) 4GLs

B) macro languages

C) object-oriented languages

D) visual programming languages

2. Firewalls are used to protect against ________ .

A) Unauthorized Attacks

B) Virus Attacks

C) Data Driven Attacks

D) Fire Attacks

3. This is a standard way for a Web server to pass a Web users request to an application program and to receive data back to forward to the user-

A) Interrupt request

B) Forward DNS lookup

C) Data-Link layer

D) Common gateway interface

4. Three SQL, DDL, CREATE commands are ________ .

A) Schema, Base and Table

B) Base, Table and Schema

C) Key, Base and Table

D) Schema, Table and View

5. Data are ________ in client/server computing.

A) never sent to the client machine

B) never sent to the client machine

C) sent only upon the clients request

D) sent in complete copies for the client to filter and sort

6. Which of the following will NOT eliminates the ambiguities of a null value?

A) Define the attribute as required

B) Define subtypes

C) Define each attribute as having an initial value that is recognized as blank

D) Define supertypes

7. The ________ directory is mandatory for every disk.

A) Root

B) Base

C) Sub

D) Case

8. This is a group of servers that share work and may be able to back each other up if one server fails.

A) Channel bank

B) Cluster

C) Tiger team

D) Serverless backup

1. D 2. A 3. D 4. D
5. C 6. D 7. C 8. B
Tags :